Internet Virus Frames Users For Child Porn

More
14 years 5 months ago #26733 by Br. John


Internet Virus Frames Users For Child Porn

JORDAN ROBERTSON | 11/ 9/09 12:10 AM |

WHAT'S YOUR REACTION?

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses – the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen.

Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.

Whatever the motivation, you get child porn on your computer – and might not realize it until police knock at your door.

An Associated Press investigation found cases in which innocent people have been branded as pedophiles after their co-workers or loved ones stumbled upon child porn placed on a PC through a virus. It can cost victims hundreds of thousands of dollars to prove their innocence.

Their situations are complicated by the fact that actual pedophiles often blame viruses – a defense rightfully viewed with skepticism by law enforcement.

\"It's an example of the old `dog ate my homework' excuse,\" says Phil Malone, director of the Cyberlaw Clinic at Harvard's Berkman Center for Internet & Society. \"The problem is, sometimes the dog does eat your homework.\"

The AP's investigation included interviewing people who had been found with child porn on their computers. The AP reviewed court records and spoke to prosecutors, police and computer examiners.

Story continues below

One case involved Michael Fiola, a former investigator with the Massachusetts agency that oversees workers' compensation.

In 2007, Fiola's bosses became suspicious after the Internet bill for his state-issued laptop showed that he used 4 1/2 times more data than his colleagues. A technician found child porn in the PC folder that stores images viewed online.

Fiola was fired and charged with possession of child pornography, which carries up to five years in prison. He endured death threats, his car tires were slashed and he was shunned by friends.

Fiola and his wife fought the case, spending $250,000 on legal fees. They liquidated their savings, took a second mortgage and sold their car.

An inspection for his defense revealed the laptop was severely infected. It was programmed to visit as many as 40 child porn sites per minute – an inhuman feat. While Fiola and his wife were out to dinner one night, someone logged on to the computer and porn flowed in for an hour and a half.

Prosecutors performed another test and confirmed the defense findings. The charge was dropped – 11 months after it was filed.

The Fiolas say they have health problems from the stress of the case. They say they've talked to dozens of lawyers but can't get one to sue the state, because of a cap on the amount they can recover.

\"It ruined my life, my wife's life and my family's life,\" he says.

The Massachusetts attorney general's office, which charged Fiola, declined interview requests.

At any moment, about 20 million of the estimated 1 billion Internet-connected PCs worldwide are infected with viruses that could give hackers full control, according to security software maker F-Secure Corp. Computers often get infected when people open e-mail attachments from unknown sources or visit a malicious Web page.

Pedophiles can tap viruses in several ways. The simplest is to force someone else's computer to surf child porn sites, collecting images along the way. Or a computer can be made into a warehouse for pictures and videos that can be viewed remotely when the PC is online.

\"They're kind of like locusts that descend on a cornfield: They eat up everything in sight and they move on to the next cornfield,\" says Eric Goldman, academic director of the High Tech Law Institute at Santa Clara University. Goldman has represented Web companies that discovered child pornographers were abusing their legitimate services.

But pedophiles need not be involved: Child porn can land on a computer in a sick prank or an attempt to frame the PC's owner.

In the first publicly known cases of individuals being victimized, two men in the United Kingdom were cleared in 2003 after viruses were shown to have been responsible for the child porn on their PCs.

In one case, an infected e-mail or pop-up ad poisoned a defense contractor's PC and downloaded the offensive pictures.

In the other, a virus changed the home page on a man's Web browser to display child porn, a discovery made by his 7-year-old daughter. The man spent more than a week in jail and three months in a halfway house, and lost custody of his daughter.

Chris Watts, a computer examiner in Britain, says he helped clear a hotel manager whose co-workers found child porn on the PC they shared with him.

Watts found that while surfing the Internet for ways to play computer games without paying for them, the manager had visited a site for pirated software. It redirected visitors to child porn sites if they were inactive for a certain period.

In all these cases, the central evidence wasn't in dispute: Pornography was on a computer. But proving how it got there was difficult.

Tami Loehrs, who inspected Fiola's computer, recalls a case in Arizona in which a computer was so \"extensively infected\" that it would be \"virtually impossible\" to prove what an indictment alleged: that a 16-year-old who used the PC had uploaded child pornography to a Yahoo group.

Prosecutors dropped the charge and let the boy plead guilty to a separate crime that kept him out of jail, though they say they did it only because of his age and lack of a criminal record.

Many prosecutors say blaming a computer virus for child porn is a new version of an old ploy.

\"We call it the SODDI defense: Some Other Dude Did It,\" says James Anderson, a federal prosecutor in Wyoming.

However, forensic examiners say it would be hard for a pedophile to get away with his crime by using a bogus virus defense.

\"I personally would feel more comfortable investing my retirement in the lottery before trying to defend myself with that,\" says forensics specialist Jeff Fischbach.

Even careful child porn collectors tend to leave incriminating e-mails, DVDs or other clues. Virus defenses are no match for such evidence, says Damon King, trial attorney for the U.S. Justice Department's Child Exploitation and Obscenity Section.

But while the virus defense does not appear to be letting real pedophiles out of trouble, there have been cases in which forensic examiners insist that legitimate claims did not get completely aired.

Loehrs points to Ned Solon of Casper, Wyo., who is serving six years for child porn found in a folder used by a file-sharing program on his computer.

Solon admits he used the program to download video games and adult porn – but not child porn. So what could explain that material?

Loehrs testified that Solon's antivirus software wasn't working properly and appeared to have shut off for long stretches, a sign of an infection. She found no evidence the five child porn videos on Solon's computer had been viewed or downloaded fully. The porn was in a folder the file-sharing program labeled as \"incomplete\" because the downloads were canceled or generated an error.

This defense was curtailed, however, when Loehrs ended her investigation in a dispute with the judge over her fees. Computer exams can cost tens of thousands of dollars. Defendants can ask the courts to pay, but sometimes judges balk at the price. Although Loehrs stopped working for Solon, she argues he is innocent.

\"I don't think it was him, I really don't,\" Loehrs says. \"There was too much evidence that it wasn't him.\"

The prosecution's forensics expert, Randy Huff, maintains that Solon's antivirus software was working properly. And he says he ran other antivirus programs on the computer and didn't find an infection – although security experts say antivirus scans frequently miss things.

\"He actually had a very clean computer compared to some of the other cases I do,\" Huff says.

The jury took two hours to convict Solon.

\"Everybody feels they're innocent in prison. Nobody believes me because that's what everybody says,\" says Solon, whose case is being appealed. \"All I know is I did not do it. I never put the stuff on there. I never saw the stuff on there. I can only hope that someday the truth will come out.\"

But can it? It can be impossible to tell with certainty how a file got onto a PC.

\"Computers are not to be trusted,\" says Jeremiah Grossman, founder of WhiteHat Security Inc. He describes it as \"painfully simple\" to get a computer to download something the owner doesn't want – whether it's a program that displays ads or one that stores illegal pictures.

It's possible, Grossman says, that more illicit material is waiting to be discovered.

\"Just because it's there doesn't mean the person intended for it to be there – whatever it is, child porn included.\"

Founder of The Order

Please Log in to join the conversation.

  • RyuJin
  • Offline
  • Master
  • Master
    Registered
  • The Path of Ignorance is Paved with Fear
More
14 years 5 months ago #26734 by RyuJin
that is why i run 2 firewalls, 2 different a/v programs and i constantly monitor the performance and activity of my pc...and i absolutely avoid any potentially shady website...too many viruses and it's way too costly if something happens...

Warning: Spoiler!

Quotes:
Warning: Spoiler!

J.L.Lawson,Master Knight, M.div, Eastern Studies S.I.G. Advisor (Formerly Known as the Buddhist Rite)
Former Masters: GM Kana Seiko Haruki , Br.John
Current Apprentices: Baru
Former Apprentices:Adhara(knight), Zenchi (knight)

Please Log in to join the conversation.

  • Visitor
  • Visitor
    Public
14 years 5 months ago #26743 by
I'm not as paranoid as RyuJin, but this article does show that keeping your computer's security up to date is highly important. You also need to learn about other things these days, such as keyloggers, rootkits, and trojans. Viruses are just one of the threats (no, a trojan isn't always a virus).

I have a friend who collects viruses, and he actually recommends Avast! (free) and AVG (free) for the protections that they offer. He also says that only one or the other should be run, as it will bog down your machine otherwise. However, backing these up with another checker called ClamWin apparently does something extra that doesn't bog down your computer in the meantime.

In addition, for Windows users, updating to all of the critical security updates can help keep your computer secure. If things start acting funny, you need to check it. If you're not computer literate, either find someone who is or take your computer in to get it serviced.

Finally, using a program such as HostsMan to prevent accidentally visiting sites which you know for sure have bad software on them is highly useful, and (unlike the automated Norton and McAfee programs) there isn't extra software to slow your system down: it's blocked by the system that allows access. While there are ways around this, there aren't many that virus checking programs don't know about, so they look for them.

Just my two cents' worth--I had to put stuff together on this for a work report about a year ago (though it wasn't talking about child porn).

Please Log in to join the conversation.

  • RyuJin
  • Offline
  • Master
  • Master
    Registered
  • The Path of Ignorance is Paved with Fear
More
14 years 5 months ago #26746 by RyuJin
:laugh: i'm not paranoid...just protective...have to be i had a stalker 9 years ago...and i spent a ton on my laptop...too much money to risk having anything go wrong with it...i have a friend on campus that's a hacker and he tried to hack my laptop....with 15 minutes and my ip he still couldn't gain access to it(i watched him hack someone elses laptop in less then a minute)...i know my added security isn't foolproof but at least i'll make them work their tails off to gain access :)

Warning: Spoiler!

Quotes:
Warning: Spoiler!

J.L.Lawson,Master Knight, M.div, Eastern Studies S.I.G. Advisor (Formerly Known as the Buddhist Rite)
Former Masters: GM Kana Seiko Haruki , Br.John
Current Apprentices: Baru
Former Apprentices:Adhara(knight), Zenchi (knight)

Please Log in to join the conversation.

  • Visitor
  • Visitor
    Public
14 years 5 months ago #26749 by
I said it was paranoia, and I stand by that... however, just because it's paranoia doesn't mean it's not well-justified. For some things you need to be paranoid. My ISP, for example, uses NAT with intermediary firewalls (a rather brilliant system, actually). Unfortunately, one of these intermediary firewalls is made by Sandvine, so I can never predict when my traffic will be interfered with. How's that for paranoia?

The issue about hackers: generally, the ones who could hack someone's laptop won't, unless you have their attention. Adding a port-knocking scheme for incoming access is something which isn't difficult to set up with iptables in Linux, but Windows users (who would likely be the targets of most viruses because of the way that Windows is made and its prevalence throughout the computing world) are generally not going to need heavyweight security, since mostly they'd be doing homework and Windows Vista is good about not storing financial transactions in SSL unless you tell it to. XP, not so much, but still better than previous versions of Windows.

The issue in this case is Windows. Linux simply isn't susceptible in the same way, and so viruses and the like that are found on Linux platforms tend to be short-lived (and are few in number to begin with). Windows, because of its insistence on proprietary information at its core, remains susceptible to literally hundreds of thousands of viruses, trojans, worms, and other malware.

The most basic protection needed against viruses is to have a virus checker that actively checks your system (such as Norton or AVG), and a backup system such as ClamWin.

You might need added security if you're a real jerk to everyone, or if your job is unpopular, or if you hang out online with unethical hackers a lot (ethical hackers will ask permission before trying to hack your system, so that you know that they aren't trying to take over your computer--but in general, you aren't going to want or need such levels of security).

So, reiterating my previous point, RyuJin: you are ultimately paranoid, even if that paranoia is well-justified. Most people don't need 2 levels of firewalls, as one level that actually works is just fine (oh, and, for those reading this, a ProTip: The firewall included with Windows isn't really all that good).

Please Log in to join the conversation.

  • RyuJin
  • Offline
  • Master
  • Master
    Registered
  • The Path of Ignorance is Paved with Fear
More
14 years 5 months ago #26751 by RyuJin
lol thats why i run 2 firewalls the windows one is rather weak even at max settings so i use a program from trend called hijack this. my friend runs linux and asked if he could try to hack mine...i have vista 64bit professional, oddly i haven't had any of the o/s problems that others have complained about with vista...i do play an online game and that game is the main reason i run the second firewall...the last pc i used got hacked while i was playing, even though gameguard was running it didn't do much good...unfortunately all of acclaims attempts to keep hackers out of the game don't work...of course no matter how much security you put up someone will always find a way around if they want to...i do like that vista doesn't store anything without permission, i also set mine to ask permission before running any program which allows me keep track of whats going on.

Warning: Spoiler!

Quotes:
Warning: Spoiler!

J.L.Lawson,Master Knight, M.div, Eastern Studies S.I.G. Advisor (Formerly Known as the Buddhist Rite)
Former Masters: GM Kana Seiko Haruki , Br.John
Current Apprentices: Baru
Former Apprentices:Adhara(knight), Zenchi (knight)

Please Log in to join the conversation.

  • Visitor
  • Visitor
    Public
14 years 5 months ago #26753 by
Well - not really possible on a regular laptop (unless you dont carry it around) but on my desktop PC I have several HDD's (5 on last count) one of them I have set so my web browsers use this drive for the 'internet cache' which is where and how most nasties get in and misbehave - it gives a small barrier between the web and your system files.

Also its much easier to erase such data without 'hunting the files' and every so often you can format the drive to rid yourself of any traces of files normal deleted/cache flushes miss.

Another thing to do is store all you pictures on external/removable drives so that if you are paranoid about such an attack - you can do a faster scan of your pc for picture files (in search type *.jpg or bmp etc etc etc to find all the picture files in one sweep - then you use thumbnail view to see whats what - alot of it will be borders used in apps etc and clipart - but its best to check every file and folder as these folders are the most likely place unwelcome files will be put

Someone clever enough to hijack your pc and use it as a porn server is not going to be dumb enough to host dodgy files in your 'my documents' folder (a colleague/ex wife might tho :lol:)

Anyway - uts a concept ive thought of in the past - how the hell couild you prove innocence?

The only way to be sure is to not leave your pc connected tot he net 24/7 (alot of folk do) and to monitor your bandwidth usage (you can do this by accessing your account on your service providers homepage) Also get used to how you net connection usually runs - if you suspect an attack - get your IP changed.

MTFBWY - A

Please Log in to join the conversation.

  • RyuJin
  • Offline
  • Master
  • Master
    Registered
  • The Path of Ignorance is Paved with Fear
More
14 years 5 months ago #26761 by RyuJin
true...most do leave their systems connected 24/7....i keep mine off when not in use, and as a general rule i try to change my ip at least once a week...though it happens more often then that since i use the schools network when im there and my own network when i get home...some internet services automatically change your ip such as road runner or verizon fios...

Warning: Spoiler!

Quotes:
Warning: Spoiler!

J.L.Lawson,Master Knight, M.div, Eastern Studies S.I.G. Advisor (Formerly Known as the Buddhist Rite)
Former Masters: GM Kana Seiko Haruki , Br.John
Current Apprentices: Baru
Former Apprentices:Adhara(knight), Zenchi (knight)

Please Log in to join the conversation.

Moderators: ZerokevlarVerheilenChaotishRabeRiniTavi